Skip to main content

Showing 1–13 of 13 results for author: Fereidooni, H

Searching in archive cs. Search in all archives.
.
  1. FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning

    Authors: Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Federated learning (FL) is a collaborative learning paradigm allowing multiple clients to jointly train a model without sharing their training data. However, FL is susceptible to poisoning attacks, in which the adversary injects manipulated model updates into the federated model aggregation process to corrupt or destroy predictions (untargeted poisoning) or implant hidden functionalities (targeted… ▽ More

    Submitted 16 January, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. 16 pages, 8 figures, 12 tables, 1 algorithm, 3 equations

  2. DEMASQ: Unmasking the ChatGPT Wordsmith

    Authors: Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi

    Abstract: The potential misuse of ChatGPT and other Large Language Models (LLMs) has raised concerns regarding the dissemination of false information, plagiarism, academic dishonesty, and fraudulent activities. Consequently, distinguishing between AI-generated and human-generated content has emerged as an intriguing research topic. However, current text detection methods lack precision and are often restric… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: To appear in the Network and Distributed System Security (NDSS) Symposium 2024. 15 pages, 3 figures, 6 tables, 3 algorithms, 6 equations

  3. arXiv:2310.02113  [pdf, other

    cs.CR cs.DC cs.LG

    FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks

    Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi

    Abstract: Federated learning (FL) is a distributed learning process that uses a trusted aggregation server to allow multiple parties (or clients) to collaboratively train a machine learning model without having them share their private data. Recent research, however, has demonstrated the effectiveness of inference and poisoning attacks on FL. Mitigating both attacks simultaneously is very challenging. State… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: To appear in Annual Computer Security Applications Conference (ACSAC) 2023

  4. arXiv:2304.01487  [pdf, ps, other

    cs.LG cs.AI cs.CL

    To ChatGPT, or not to ChatGPT: That is the question!

    Authors: Alessandro Pegoraro, Kavita Kumari, Hossein Fereidooni, Ahmad-Reza Sadeghi

    Abstract: ChatGPT has become a global sensation. As ChatGPT and other Large Language Models (LLMs) emerge, concerns of misusing them in various ways increase, such as disseminating fake news, plagiarism, manipulating public opinion, cheating, and fraud. Hence, distinguishing AI-generated from human-generated becomes increasingly essential. Researchers have proposed various detection methodologies, ranging f… ▽ More

    Submitted 5 April, 2023; v1 submitted 3 April, 2023; originally announced April 2023.

  5. arXiv:2302.07589  [pdf, other

    cs.CR cs.LG

    ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks

    Authors: Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi

    Abstract: IoT application domains, device diversity and connectivity are rapidly growing. IoT devices control various functions in smart homes and buildings, smart cities, and smart factories, making these devices an attractive target for attackers. On the other hand, the large variability of different application scenarios and inherent heterogeneity of devices make it very challenging to reliably detect ab… ▽ More

    Submitted 16 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: To appear in the 32nd USENIX Security Symposium, August 2022, Anaheim CA, USA

  6. arXiv:2302.02740  [pdf, other

    cs.CR

    AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

    Authors: Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi

    Abstract: Mobile applications are widely used for online services sharing a large amount of personal data online. One-time authentication techniques such as passwords and physiological biometrics (e.g., fingerprint, face, and iris) have their own advantages but also disadvantages since they can be stolen or emulated, and do not prevent access to the underlying device, once it is unlocked. To address these c… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: 16 pages, 7 figures

  7. arXiv:2301.09508  [pdf, other

    cs.LG cs.AI

    BayBFed: Bayesian Backdoor Defense for Federated Learning

    Authors: Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi

    Abstract: Federated learning (FL) allows participants to jointly train a machine learning model without sharing their private data with others. However, FL is vulnerable to poisoning attacks such as backdoor attacks. Consequently, a variety of defenses have recently been proposed, which have primarily utilized intermediary states of the global model (i.e., logits) or distance of the local models (i.e., L2-n… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  8. arXiv:2103.12607  [pdf, other

    cs.CR cs.LG

    ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

    Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar

    Abstract: Ethereum smart contracts are automated decentralized applications on the blockchain that describe the terms of the agreement between buyers and sellers, reducing the need for trusted intermediaries and arbitration. However, the deployment of smart contracts introduces new attack vectors into the cryptocurrency systems. In particular, programming flaws in smart contracts can be and have already bee… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 17 pages, 10 figures, 5 tables, 5 equations, 2 listings

  9. arXiv:2101.02281  [pdf, other

    cs.CR

    FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

    Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider

    Abstract: Federated Learning (FL) is a collaborative machine learning approach allowing participants to jointly train a model without having to share their private, potentially sensitive local datasets with others. Despite its benefits, FL is vulnerable to backdoor attacks, in which an adversary injects manipulated model updates into the model aggregation process so that the resulting model will provide tar… ▽ More

    Submitted 5 August, 2023; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: This extended version incorporates a novel section (Section 10) that provides a comprehensive analysis of recent proposed attacks, notably "3DFed: Adaptive and extensible framework for covert backdoor attack in federated learning" by Li et al. This new section addresses flawed assertions made in the papers that aim to bypass FLAME or misinterpreted its fundamental design principles

  10. Peek-a-Boo: I see your smart home activities, even encrypted!

    Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac

    Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploi… ▽ More

    Submitted 13 May, 2020; v1 submitted 8 August, 2018; originally announced August 2018.

    Comments: Update (May 13, 2020): This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20), July 8-10, 2020, Linz (Virtual Event), Austria, https://doi.org/10.1145/3395351.3399421

  11. arXiv:1804.07474  [pdf, other

    cs.CR

    DÏoT: A Federated Self-learning Anomaly Detection System for IoT

    Authors: Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi

    Abstract: IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have vulnerable IoT devices that are easy to compromise. This has led to a new category of malware specifically targeting IoT devices. However, existing intrusion detection techniques are not effective in d… ▽ More

    Submitted 10 May, 2019; v1 submitted 20 April, 2018; originally announced April 2018.

    Comments: Accepted version of paper to appear at ICDCS 2019, Dallas, TX, USA, July 2019

    Journal ref: Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS), 2019

  12. arXiv:1706.09165  [pdf, other

    cs.CR

    Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

    Authors: Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti

    Abstract: Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange f… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

  13. arXiv:1611.10231  [pdf, ps, other

    cs.CR

    Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions

    Authors: Parvez Faruki, Hossein Fereidooni, Vijay Laxmi, Mauro Conti, Manoj Gaur

    Abstract: Mobile devices have become ubiquitous due to centralization of private user information, contacts, messages and multiple sensors. Google Android, an open-source mobile Operating System (OS), is currently the market leader. Android popularity has motivated the malware authors to employ set of cyber attacks leveraging code obfuscation techniques. Obfuscation is an action that modifies an application… ▽ More

    Submitted 30 November, 2016; originally announced November 2016.